A cloud service that is made available to the general public, often on a pay-as-you-go basis, is usually called a public cloud. As its services can be used by customers on demand, without a fixed fee agreement, this is an example of utility computing.
Public clouds are also known as robust and very well structured multi-tenancy environments. They are usually considered effective solutions to common problems in proprietary models, such as lack of infrastructure agility to meet seasonal demands and innovations, operational and managerial complexity, and immobilization of the company's budget outside its core activity (that is, outside generation revenue).
It would not be an exaggeration to say that public cloud computing was primarily designed to provide greater computing performance, often reducing business costs, providing flexibility and agility to meet the market moment and freeing up more funds for investments in companies' core business. .
Consequently, with a public cloud configuration, all responsibilities associated with maintaining infrastructure and service stability are transferred to service providers.
It is also important to note that, in this model, security is a shared responsibility. After all, it is useless to hire a high-tech and security safe and be careless about the password. That is, users must pay attention to security, both in terms of passwords and protection against scams that take advantage of human flaws, as well as in terms of the applications they place inside their environments and their respective updates, considering that the provider , of course, it will respect the customer's privacy in its environment.
MCITP Database Administrator job role involves designing and developing logical data models, create physical databases and create data services by using Transact-SQL.
Another metaphor that we can use is that of a condominium, where, despite several security parameters that the condominium provides, the tenant still lets anyone enter his property, or usually leaves the gas on, or the door unlocked.
A user and operator can therefore share responsibility for the security of the middle layers of the software stack, while public cloud providers remain responsible for the physical security and enforcement of external firewall policies.